Internet safety
ONLINE SAFETY IS TRYING TO BE SAFE ON THE INTERNET AND IS THE KNOWLEDGE
OF MAXIMIZING THE USER'S PERSONAL SAFETY AND SECURITY RISKS TO PRIVATE
INFORMATION AND PROPERTY ASSOCIATED WITH USING THE INTERNET, AND THE
SELF-PROTECTION FROM COMPUTER CRIME IN GENERAL.
Information security
Sensitive information such as personal information and identity, passwords are
often associated with personal property (for example, bank accounts) and privacy
and may present security concerns if leaked. Unauthorized access and usage of
private information may result in consequence such as identity theft, as well as
theft of property. Common causes of information security breaches include:
PHISPHING, INTERNET SCAMS, MALWARE
SAFETY INTERNET INFORMATION
Phishing
PHISPHING is a type of scam
where the scammers disguise as a
trustworthy source in attempt to
obtain private information such as
passwords, and credit card
information, etc. through the
internet. Phishing often occurs
through emails and instant
messaging and may contain links
to websites that direct the user to
enter their private information.
These fake websites are often
designed to look identical to their
legitimate counterparts to avoid
suspicion from the user
Internet scams
Internet scams are schemes that
deceive the user in various ways
in attempt to take advantage of
them. Internet scams often aim
to cheat the victim of personal
property directly rather than
personal information through
false promises, confidence tricks
and more.
Malware
Malware, particularly spyware, is
malicious software disguised as
software designed to collect and
transmit private information,
such as passwords, without the
user's consent or knowledge.
They are often distributed
through e-mail, software and
files from unofficial locations.
Malware is one of the most
prevalent security concerns as
often it is impossible to
determine whether a file is
infected, despite the source of
the file
Personal safety
THE GROWTH OF THE INTERNET GAVE RISE TO MANY IMPORTANT SERVICES ACCESSIBLE
TO ANYONE WITH A CONNECTION. ONE OF THESE IMPORTANT SERVICES IS DIGITAL
COMMUNICATION. WHILE THIS SERVICE ALLOWED US TO COMMUNICATE WITH OTHERS
THROUGH THE INTERNET, THIS ALSO ALLOWED THE COMMUNICATION WITH
MALICIOUS USERS. WHILE MALICIOUS USERS OFTEN USE THE INTERNET FOR PERSONAL
GAIN, THIS MAY NOT BE LIMITED TO FINANCIAL/MATERIAL GAIN. THIS IS ESPECIALLY A
CONCERN TO PARENTS AND CHILDREN, AS CHILDREN ARE OFTEN TARGETS OF THESE
MALICIOUS USERS. COMMON THREATS TO PERSONAL SAFETY INCLUDE: PHISHING,
INTERNET SCAMS, MALWARE, CYBERSTALKING, CYBERBULLYING, ONLINE PREDITIONS
Cyberstalking
Cyberstalking is the use of the
Internet or other electronic means
to stalk or harass an individual, a
group of individuals, or an
organization. It may include the
making of false accusations or
statements of fact (as in
defamation), monitoring, making
threats, identity theft, damage to
data or equipment, the solicitation
of minors for sex, or gathering
information that may be used to
harass. According to a study
conducted by Baum et al. (2009),
the rate of assault through electronic
means such as e-mail or instant
messaging was over one in four out
of all stalking victims in the study.
Cyberbullying
Cyberbullying is the attack upon
an individual or group through
the use of electronic means
such as instant messaging,
social media, e-mail and other
forms of online communication
with the intent to abuse,
intimidate, or overpower. In a
2012 study of over 11,925
students in the United States, it
was indicated that 23% of
adolescents reported being a
victim of cyber bullying, 30% of
which reported experiencing
suicidal behavior
Online predation
Online predation is the act of
engaging an underage minor
into inappropriate sexual
relationships through the
internet. Online predators may
attempt to initiate and seduce
minors into relationships
through the use of chat rooms
or internet forums In a sample
of 216 incarcerated sexual
offenders, the behavior
characteristics that emerged
were categorized into three
groups: A) manipulative -
typically a child molester; B)
Opportunist - typically a rapist
and C) Coercive being a mixture
of both rapists and child
molesters.